Sciweavers

537 search results - page 62 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
CSFW
2012
IEEE
13 years 10 days ago
Verifying Privacy-Type Properties in a Modular Way
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
Myrto Arapinis, Vincent Cheval, Stéphanie D...
ICPR
2000
IEEE
15 years 2 months ago
A Unifying View of Image Similarity
We study solutions to the problem of evaluating image similarity in the context of content-based image retrieval (CBIR). Retrieval is formulated as a classification problem, wher...
Nuno Vasconcelos, Andrew Lippman
COMPSAC
2008
IEEE
14 years 10 months ago
Analyzing Software Evolvability
Software evolution is characterized by inevitable changes of software and increasing software complexities, which in turn may lead to huge costs unless rigorously taking into acco...
Hongyu Pei Breivold, Ivica Crnkovic, Peter J. Erik...
EOR
2008
69views more  EOR 2008»
14 years 10 months ago
Coordinating the supply chain in the agricultural seed industry
This paper examines contract practices between suppliers and retailers in the agricultural seed industry. We construct and analyze single-retailer models of various contract types...
Samuel Burer, Philip C. Jones, Timothy J. Lowe
HCI
2009
14 years 7 months ago
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data
Due to its convenient, low physical restraint, and electric noise tolerant features, functional near-infrared spectroscopy (fNIRS) is expected to be a useful tool in monitoring use...
Takayuki Nozawa, Toshiyuki Kondo